Privacy Preservation Using Game-Theoretic Approach

Part of the SpringerBriefs in Computer Science book series (BRIEFSCOMPUTER)


In this chapter, we propose a distributed approach for LBS privacy protection. In order to protect users from a recently highlighted threat model and achieve k-anonymity, we let distributed mobile LBS users generate dummies according to their own privacy needs when the total number of users in a service area is less than k. From a game theoretic perspective, we identify the strategy space of the autonomous and self-interested users in a typical LBS system, and formulate two Bayesian games for the cases with and without the effect of decision timing. The existence and properties of the Bayesian Nash Equilibria for both models are analyzed. Based on the analysis, we further propose a distributed algorithm to optimize user payoffs. Through simulations using real-world privacy data trace, we justify our theoretical results.


Mobile User Side Information Privacy Protection Location Base Service Real Identity 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Abdesslem, F.B., Henderson, T., Parris, I.: CRAWDAD data set st-andrews locshare (v.2011-10-12). (2011)
  2. 2.
    Ardagna, C., Cremonini, M., Damiani, E., De Capitani di Vimercati, S., Samarati, P.: Location privacy protection through obfuscation-based techniques. Data and Applications Security XXI, pp. 47–60 (2007)Google Scholar
  3. 3.
    Beresford, A., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Comput. 2(1), 46–55 (2003)Google Scholar
  4. 4.
    Bettini, C., Wang, X., Jajodia, S.: Protecting privacy against location-based personal identification. Secure Data Management, pp. 185–199 (2005)Google Scholar
  5. 5.
    Cheng, R., Zhang, Y., Bertino, E., Prabhakar, S.: Preserving user location privacy in mobile data management infrastructures. In: Proceedings of the 6th Workshop on Privacy Enhancing Technologies (PETs), pp. 393–412 (2006)Google Scholar
  6. 6.
    Chow, C.Y., Mokbel, M.F., Liu, X.: A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In: Proceedings of GIS (2006)Google Scholar
  7. 7.
    Duckham, M., Kulik, L.: A formal model of obfuscation and negotiation for location privacy. IEEE Pervasive Comput. (2005)Google Scholar
  8. 8.
    Farkas, C., Jajodia, S.: The inference problem: a survey. ACM SIGKDD Explor. Newsl. 4(2), 6–11 (2002)CrossRefGoogle Scholar
  9. 9.
    Freudiger, J., Manshaei, M., Hubaux, J., Parkes, D.: On non-cooperative location privacy: a game-theoretic analysis. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS), pp. 324–337 (2009)Google Scholar
  10. 10.
    Freudiger, J., Shokri, R., Hubaux, J.P.: On the optimal placement of mix zones. In: Proceedings of the 9th International Symposium on Privacy Enhancing Technologies (PETS), pp. 216–234 (2009)Google Scholar
  11. 11.
    Gedik, B., Liu, L.: Location privacy in mobile systems: A personalized anonymization model. In: Proceedings of the International Conference on Distributed Computing Systems (ICDCS), pp. 620–629 (2005)Google Scholar
  12. 12.
    Gianini, G., Damiani, E.: A game-theoretical approach to data-privacy protection from context-based inference attacks: a location-privacy protection case study. Secure Data Management (2008)Google Scholar
  13. 13.
    Gianini, G., Damiani, E.: Cloaking games in location based services. In: Proceedings of the ACM Workshop on Secure Web Services (2008)Google Scholar
  14. 14.
    Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the International Conference on Mobile Systems, Applications and Services (MobiSys), pp. 31–42 (2003)Google Scholar
  15. 15.
    Harsanyi, J.: Games with incomplete information played by “bayesian” players, i-iii. Manag. Sci. 14, 159–182 (1967)Google Scholar
  16. 16.
    Hoh, B., Gruteser, M.: Protecting location privacy through path confusion. In: Proceedings of SecureComm (2005)Google Scholar
  17. 17.
    Karimi Adl, R., Askari, M., Barker, K., Safavi-Naini, R.: Privacy consensus in anonymization systems via game theory. Data and Applications Security and Privacy XXVI. 7371, 74–89 (2012)Google Scholar
  18. 18.
    Kido, H., Yanagisawa, Y., Satoh, T.: An anonymous communication technique using dummies for location-based services. In: Proceedings of the International Conference on Pervasive Services (ICPS) (2005)Google Scholar
  19. 19.
    Krumm, J.: A survey of computational location privacy. Pers. Ubiquitous Comput. 13, 391–399 (2009)Google Scholar
  20. 20.
    Krumm, J.: Inference attacks on location tracks. IEEE Pervasive Comput. 127–143 (2007)Google Scholar
  21. 21.
    Li, M., Sampigethaya, K., Huang, L., Poovendran, R.: Swing & swap: user-centric approaches towards maximizing location privacy. In: Proceedings of the ACM Workshop on Privacy in Electronic Society (2006)Google Scholar
  22. 22.
    Lu, H., Jensen, C.S., Yiu, M.L.: Pad: privacy-area aware, dummy-based location privacy in mobile services. In: Proceedings of MobiDE (2008)Google Scholar
  23. 23.
    Ma, C.Y., Yau, D.K., Yip, N.K., Rao, N.S.: Privacy vulnerability of published anonymous mobility traces. In: Proceedings of the International Conference on Mobile Computing and Networking (MobiCom) (2010)Google Scholar
  24. 24.
    Mokbel, M.F., Chow, C.Y., Aref, W.G.: The new casper: query processing for location services without compromising privacy. In: Proceedings of the 32nd International Conference on Very Large Data Bases (VLDB), pp. 763–774. VLDB Endowment (2006)Google Scholar
  25. 25.
    Osborne, M.: An introduction to game theory. Oxford University Press, New York (2004)Google Scholar
  26. 26.
    Project, T.R.: R software. (2012)
  27. 27.
    Shokri, R., Theodorakopoulos, G., Troncoso, C., Hubaux, J., Le Boudec, J.: Protecting location privacy: Optimal strategy against localization attacks. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS) (2012)Google Scholar
  28. 28.
    Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty, Fuzziness Knowl. based Syst. 10, 557–570 (2002)Google Scholar
  29. 29.
    Terrovitis, M., Mamoulis, N.: Privacy preservation in the publication of trajectories. In: Proceedings of the International Conference on Mobile Data Management (MDM), pp. 65–72 (2008)Google Scholar
  30. 30.
    Tran, M., Echizen, I., Duong, A.: Binomial-mix-based location anonymizer system with global dummy generation to preserve user location privacy in location-based services. In: Proceedings of ARES (2010)Google Scholar
  31. 31.
    Wang, T., Liu, L.: Privacy-aware mobile services over road networks. In: Proceedings of the VLDB Endowment 2(1), 1042–1053 (2009)Google Scholar

Copyright information

© The Author(s) 2013

Authors and Affiliations

  1. 1.University of FloridaGainesvilleUSA

Personalised recommendations